Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Pipeline Manager Flex Consumption (DPM Flex) Data Sheet

Securonix Data Pipeline Manager Flex (DPM Flex) changes how SIEM data is managed with AI-enabled, value-based data consumption that lets you ingest, store, and analyze more data for the same cost. Expand visibility, strengthen compliance, and unlock more value from your existing investment.

Why Every Tech Company is Talking About OWASP for AI (and You Should Too)

AI is changing everything—but with innovation comes new risks. In this episode of AI on the Edge, we dive deep into OWASP's Top 10 for Large Language Models with security leader Steve Wilson (Exabeam). Discover why every tech company is suddenly talking about LLM security and how you can stay ahead. Inside this episode: Why traditional security doesn’t work for AI Learn from Steve’s new book The Developer’s Playbook for LLM Security and get actionable tips to protect your AI systems.

Agentic Controls for an Agentic World: Why Traditional Security Can't Keep Up

AI agents now move data, collaborate, and make decisions at machine speed — millions of actions per second. But our entire security architecture was built for humans, not for autonomous AI. In this new Agentic World, every action is faster, every breach more invisible, and every compliance gap more dangerous. Protecto introduces Agentic Controls — intelligent, context-aware CBAC Agents that live inside AI workflows. They understand policies written in plain English, enforce zero-trust decisions before data ever leaves its boundary, and protect privacy across industries.

The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

Approximately $350 million in preventable losses stem from polymorphic malware, a malicious software virus that constantly changes its code to evade detection. With 18% of new malware using adaptive techniques that challenge traditional defenses, now is the time to enhance your organization's security posture. James McQuiggan, CISO Advisor at KnowBe4, shares valuable insights and proactive strategies to defend against polymorphic malware attacks. You'll discover.

Payroll Pirates: The Widespread Malvertising Network

Since at least May 2023, a financially motivated cyber-crime network has been operating a phishing campaign primarily abusing Google Ads, and occasionally Microsoft Ads to drive traffic to credential-harvesting websites. This campaign – part of which was named “Payroll Pirates” by SilentPush – has remained active, with periodic updates to tactics and target rotations.

Find the Fixer: The AI Agent Bringing Order to Ownership

Assigning remediation tasks across an enterprise organization can feel like navigating a maze of inconsistent tags, overlapping teams, and unclear ownership. It’s one of the most persistent operational challenges in vulnerability and exposure management, and one of the biggest barriers to speed. Each scanner and cloud platform comes with its own tagging logic. One system uses ProductOwner, another productowner. Some tags are outdated, others duplicated, and many have no clear purpose.

Honored to Be Named a Challenger in the 2025 Gartner Magic Quadrant for Exposure Assessment Platforms

We’re proud to share that Nucleus Security has been named a Challenger in the inaugural 2025 Gartner Magic Quadrant for Exposure Assessment Platforms (EAPs) — recognized for our completeness of vision and ability to execute. This marks a significant milestone not only for Nucleus, but for the evolution of our entire industry. For the first time, Gartner has formally recognized Exposure Assessment Platforms as a distinct category.

Understanding the MITRE ATT&CK Framework: A Modern Lens on Adversary Behavior

The MITRE ATT&CK framework is one of the most widely adopted and respected resources in the field of cyber threat intelligence. Serving as a common language for security professionals across industries and departments, it provides a consistent and structured way to describe adversary behavior.